Show plain JSON{"id": "CVE-2024-10005", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "security@hashicorp.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.2, "exploitabilityScore": 2.8}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 5.8, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 1.4, "exploitabilityScore": 3.9}]}, "published": "2024-10-30T22:15:02.820", "references": [{"url": "https://discuss.hashicorp.com/t/hcsec-2024-22-consul-l7-intentions-vulnerable-to-url-path-bypass", "tags": ["Vendor Advisory"], "source": "security@hashicorp.com"}, {"url": "https://security.netapp.com/advisory/ntap-20250110-0004/", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "security@hashicorp.com", "description": [{"lang": "en", "value": "CWE-22"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability was identified in Consul and Consul Enterprise (\u201cConsul\u201d) such that using URL paths in L7 traffic intentions could bypass HTTP request path-based access rules."}, {"lang": "es", "value": "Se identific\u00f3 una vulnerabilidad en Consul y Consul Enterprise (\u201cConsul\u201d) tal que el uso de rutas URL en intenciones de tr\u00e1fico L7 podr\u00eda eludir las reglas de acceso basadas en rutas de solicitud HTTP."}], "lastModified": "2025-01-10T13:15:08.223", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:hashicorp:consul:*:*:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "0D16200E-5F65-48AE-A0A5-FFADA05CA755", "versionEndExcluding": "1.20.1", "versionStartIncluding": "1.4.1"}, {"criteria": "cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "4F4529FE-6B11-4CB9-A8A2-A75D10470294", "versionEndExcluding": "1.15.15", "versionStartIncluding": "1.9.0"}, {"criteria": "cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "36CDCEB8-8B22-4290-9071-81CE3F0F6B95", "versionEndExcluding": "1.18.5", "versionStartIncluding": "1.18.0"}, {"criteria": "cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "0AB043DB-FC48-4DE7-80BA-EC410ECD44F2", "versionEndExcluding": "1.19.3", "versionStartIncluding": "1.19.0"}, {"criteria": "cpe:2.3:a:hashicorp:consul:1.20.0:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "82C595D9-B7F7-487B-A2B4-B85A45DF471C"}], "operator": "OR"}]}], "sourceIdentifier": "security@hashicorp.com"}